Neighbour Pixel Color Correlativity On Image Steganalysis

Steganalysis is science of discovering presence of secretively embedded data within the potential carriers. Since images are one of the most commonly used digital media on networks, they grab less attention than other digital media types. As a result, images are very appropriate cover for concealing...

Full description

Saved in:
Bibliographic Details
Main Author: Jabbar, Alaa Abdulhussein
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16873/1/Neighbour%20Pixel%20Color%20Correlativity%20On%20Image%20Steganalysis.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.16873
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
advisor Sahib@Sahibuddin, Shahrin

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Jabbar, Alaa Abdulhussein
Neighbour Pixel Color Correlativity On Image Steganalysis
description Steganalysis is science of discovering presence of secretively embedded data within the potential carriers. Since images are one of the most commonly used digital media on networks, they grab less attention than other digital media types. As a result, images are very appropriate cover for concealing presence of secret data transmission. Insertion of external data degrades the natural color correlativity among the pixels. Statistical steganalysis is an effective approach for discovering the generated anamolies through embedding process in content of images. Various statistical steganalysis techniques have been designed to discover presence of embedding artifacts and anomalies. However, the current practices are not efficient enough for detection of steganography. To overcome the problem, this research proposes a novel statistical steganalysis technique which efficienctly detects data embedding. Since this method statistically examines the suspicious carriers then it has more capability in distinguishing effects of new steganographic techniques. Color correlativity among image pixels varies based on image content and data embedding degrades this natural correlativity. This research classifies images in four image themes and then studies their behaviors after data embedding in different embedding ratios. The proposed method examines color correlativity of pixels of the given image with the neighbor pixels and then compares the results with the extracted color correlativity behavioral patterns. The most similar color correlativity behavioral pattern determines image theme of the analyzed image and its embedding ratio. Efficiency evaluation of the designed color correlativity statistical steganalysis method shows outstanding efficiency ehancement in comparison with the current practices. The designed technique efficiently determines both image theme and embedding ratio. The efficiency dramatically increases in detecting either of image theme or estimating message length.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Jabbar, Alaa Abdulhussein
author_facet Jabbar, Alaa Abdulhussein
author_sort Jabbar, Alaa Abdulhussein
title Neighbour Pixel Color Correlativity On Image Steganalysis
title_short Neighbour Pixel Color Correlativity On Image Steganalysis
title_full Neighbour Pixel Color Correlativity On Image Steganalysis
title_fullStr Neighbour Pixel Color Correlativity On Image Steganalysis
title_full_unstemmed Neighbour Pixel Color Correlativity On Image Steganalysis
title_sort neighbour pixel color correlativity on image steganalysis
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty Of Information And Communication Technology
publishDate 2015
url http://eprints.utem.edu.my/id/eprint/16873/1/Neighbour%20Pixel%20Color%20Correlativity%20On%20Image%20Steganalysis.pdf
_version_ 1747833905137844224
spelling my-utem-ep.168732020-11-11T09:04:18Z Neighbour Pixel Color Correlativity On Image Steganalysis 2015 Jabbar, Alaa Abdulhussein T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Steganalysis is science of discovering presence of secretively embedded data within the potential carriers. Since images are one of the most commonly used digital media on networks, they grab less attention than other digital media types. As a result, images are very appropriate cover for concealing presence of secret data transmission. Insertion of external data degrades the natural color correlativity among the pixels. Statistical steganalysis is an effective approach for discovering the generated anamolies through embedding process in content of images. Various statistical steganalysis techniques have been designed to discover presence of embedding artifacts and anomalies. However, the current practices are not efficient enough for detection of steganography. To overcome the problem, this research proposes a novel statistical steganalysis technique which efficienctly detects data embedding. Since this method statistically examines the suspicious carriers then it has more capability in distinguishing effects of new steganographic techniques. Color correlativity among image pixels varies based on image content and data embedding degrades this natural correlativity. This research classifies images in four image themes and then studies their behaviors after data embedding in different embedding ratios. The proposed method examines color correlativity of pixels of the given image with the neighbor pixels and then compares the results with the extracted color correlativity behavioral patterns. The most similar color correlativity behavioral pattern determines image theme of the analyzed image and its embedding ratio. Efficiency evaluation of the designed color correlativity statistical steganalysis method shows outstanding efficiency ehancement in comparison with the current practices. The designed technique efficiently determines both image theme and embedding ratio. The efficiency dramatically increases in detecting either of image theme or estimating message length. 2015 Thesis http://eprints.utem.edu.my/id/eprint/16873/ http://eprints.utem.edu.my/id/eprint/16873/1/Neighbour%20Pixel%20Color%20Correlativity%20On%20Image%20Steganalysis.pdf text en public http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96313 phd doctoral Universiti Teknikal Malaysia Melaka Faculty Of Information And Communication Technology Sahib@Sahibuddin, Shahrin 1. Abbas, F. M., 2010. A Novel Steganography-Cryptography System. In: WCECS, Proceedings of world congress on engineering and computer science, San Francisco, 20- 22 Oct 2010. WCECS. 2. Abduallah, W. M., Rahma, A. M. S., and Pathan, A. K., 2014. Mix Column Transform Based on Irreducible Polynomial Mathematics for Color Image Steganography: A Novel Approach. Computers and electrical engineering, 40, pp. 1390–1404. 3. Afrakhteh, M., 2010. Steganography based on utilizing more surrounding pixels. [e-book] Universiti Teknologi Malaysia. Available through: Universiti Teknologi Malaysia Library 4. < http://eprints.utm.my/11093/ > [Accessed on 4 Dece,ber 2013]. 5. Alomari, R., and Al-Jaber, A., 2004. A fragile watermarking algorithm for content authentication. International journal of computing and information science, 2, pp. 27–37. 6. Al-Otum, H. M., 2014. Semi-fragile Watermarking for Grayscale Image Authentication and Tamper Detection Based on an Adjusted Expanded-bit Multi-scale Quantization-based Technique. J. Vis. Commun. Image R., 25, pp. 1064–1081. 7. Anees, A., Siddiqui, A. M., Ahmed, J., and Hussain, I., 2014. A Technique for Digital Steganography Using Chaotic Maps. Nonlinear Dyn, 75, pp. 807–816. 8. Balasubramanian, C., Selvakumar, S. and Geetha, S., 2014. High Payload Image Steganography with Reduced Distortion Using Octonary Pixel Pairing Scheme. Multimed Tools Appl, 73, pp. 2223–2245. 9. Behnia, S., Ahadpour, S., and Ayubi, P., 2014. Design and Implementation of Coupled Chaotic Maps in Watermarking. Applied soft computing, 21, pp. 481–490. 10. Bender, W., Gruhl, D., Morimoto, N., and Lu, A., 1996. Techniques for Data Hiding. IBM systems journal, 35 (3&4), pp. 313-336. 11. Benenson, Z., Kuhn, U., and Lucks, S., 2008. Cryptographic Attack Metrics. Proceedings of dependability metrics. Berlin Heidelberg,2008, Springer-Verlag. 12. Bhasin, V., and Bedi, P., 2013. Steganalysis for JPEG Images Using Extreme Learning Machine. Proceedings of The IEEE International Conference on Systems, Man, and Cybernetics. Manchester, 13-16 Oct 2013, UK. 13. Bhatnagar, G., Jonathan, Q.M., Pradeep, W., and Atrey, K., 2014. Robust Logo Watermarking Using Biometrics Inspired Key Generation. Expert systems with applications, 41, pp. 4563–4578. 14. Bohme, R., 2005. Assessment of Steganalytic Methods Using Multiple Regression Models. In: Springer-Verlag, Proceedings of information hiding (7th international workshop). Berlin Heidelberg, 2005, Springer-Verlag. 15. Bohme, R., 2010. Advanced statistical steganalysis. Switzerland: Springer. 16. Braci, S., Boyer, R., and Delpha, C., 2009. Security Evaluation of Informed Watermarking Schemes. In: IEEE, Proceedings of IEEE ICIP 2009. Cairo, 2009, IEEE. 17. Cayre, F., Fontaine, C., and Furon. T., 2005. Watermarking Security : Theory and Practice. 18. IEEE transactions on signal processing, 53(10), pp. 3976-3987. 19. Celik, M.U., Sharma, G., and Tekalp, A.M., 2004. Universal Image Steganalysis Using Rate-distortion Curves. In: Proceeding of Security, Steganography, and Watermarking of Multimedia contents VI. San Jose, 18 January 2004, California. 20. Chao, A. K., and Chao, C., 2000. Robust digital watermarking & data hiding, Image systems engineering program.[online] Available at: http://ise.stanford.edu/class/ee368a_proj00/project7/index.html [Acces on 4 Dec 2013]. 21. Cheddad, A., Condell, A. J., Curran, K., and Kevitt, P. M., 2010. Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing, 90 (3), pp. 727-752. 22. Chen, J., 2014. A PVD-based Data Hiding Method with Histogram Preserving Using Pixel Pair Matching. Signal Processing: Image Communication, 29, pp. 375–384. 23. Cummins, J., Diskin, P., Lau S., and Parlett, R., 2004. Steganography and digital watermarking. [e-book] The University of Birmingham. Available through: < 24. http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography 25. .pdf> [Accessed on 4 December 2013]. 26. Dobsicek, M., 2004. Extended Steganographic System. In: FEE CTU, Proceedings of 8th international student conference on electrical engineering FEE CTU. Prague, Czech Republic, 2004, FE CTU. 27. El-Emam, N. N., 2007. Hiding a Alarge Amount of Data with High Security Using Steganography Algorithm. Journal of computer science, 3(4), pp. 223 – 232. 28. Fakhredanesh, M., Safabakhsh, R., and Rahmati, M., 2014. A Model-based Image Steganography Method Using Watson’s Visual Model. ETRI journal, 36 (3), pp. 479-489. 29. Fei, C., Kundur, D., and Kwong, R. H., 2004. Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression. IEEE transactions on image processing, 13 (2), pp. 126-144. 30. Feng-ying, H., Shang-ping, Z., and Kai-Zhi, C., 2013. JPEG Steganalysis Based on Feature Fusion by Principal Component Analysis. Applied mechanics and materials, 263-266, pp. 2933-2938. 31. Fridrich, J., 2004. Feature-based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Springer-Verlag, Proceedings of Information Hiding (6th international workshop). Berlin Heidelberg, 2004. 32. Fridrich, J., 2009. Steganography in Digital Media: Principles, Algorithms, and Applications. New York: Cambridge University Press (December 21, 2009) 33. Fridrich, J., and Goljan, M., 2002. Practical Steganalysis of Digital Images-state of The Art. In: SPIE, Proceedings of SPIE security and watermarking of multimedia contents IV. San Jose, California, USA, 19 January 2002, SPISE. 34. Fridrich, J., and Goljan, M., 2004. On Estimation of Secret Message Length in LSB Steganography in Spatial Domain. In: SPIE, Proceedings of security, steganography, and watermarking of multimedia contents VI. San Jose, California, USA, 18-22 January 2004. 35. Fridrich, J., Pevn´y, T., and Kodovsky, J., 2007. Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. In: ACM, Proceedings of ACM multimedia and security workshop (MM&SEC). Dallas, Texas, USA, 2007, ACM. 36. Garay, A., 2002. Measuring and evaluating digital watermarks in audio files. [e-book] Goergetown University. Available through: Georgetown University library 37. <http://www8.georgetown.edu/cct/thesis/AndreasGaray.pdf> Acces on 4 December 2013. 38. Gesellschaft, F. Audio & Multimedia MPEG Audio Layer-3. [online] Available at: http://www.iis.fraunhofer.de/amm/techinf/layer3/index.html [Acces on 4 December 2013]. 39. Golabi, S., Helfroush, M. S., Danyali, H., and Owjimehr, M., 2014. Robust Watermarking Against Geometric Attacks Using Partial Calculation of Radial Moments and Interval Phase Modulation. Information sciences, 269, pp. 94–105. 40. Guan, Q., Dong, J., and Tan, T., 2011. An Effective Image Steganalysis Method Based on Neighborhood Information of Pixels. In: 2011 18th IEEE International Conference on Image Processing (ICIP).Brussels, 11-14 September 2011, IEEE. 41. Gupta, R., and Jain, A., 2012. Integrating Steganography Using Genetic Algorithm and Visual Cryptography for Robust Encryption in Computer Forensics. International journal of electronics and computer science engineering, pp. 794-801. 42. Hipschman, R. The secret language, Exploratorium. [online] Available at: http://www.exploratorium.edu/ronh/secret/secret.html [Accessed on 4 Dece,ber 2013]. 43. Holub, V., and Fridrich, J., 2013. Random projections of residuals for digital image steganalysis. IEEE transactions on information forensics and security, pp. 1996-2006. I. Peterson, 2000. Hiding in DNA. [online] Available at: http://63.240.200.111/articles/20000408/mathtrek.asp [Accessed on 4 December 2013]. 44. Imran, N., Seet, B. C., and Fong, A. C. M., 2013. A Semi-oblivious Energy-aware Adaptive Watermarking for Wireless Image Sensor Networks. Multimedia systems, 20, pp.311–326. 45. Inoue, S., Makino, K., Murase, I., Takizawa, O., Matsumoto T., and Nakagawa, H. A Proposal on information hiding methods using XML. [online] Available at: http://takizawa.gr.jp/lab/nlp_xml.pdf [Accessed on 4 December 2013]. 46. J. Glatt,. MIDI is the language of gods. [online] Available at: http://www.borg.com/~jglatt/ [Accessed on 4 December 2013]. 47. J. R. Krenn , 2004. Steganography and steganalysis. [online] Available at: http://www.krenn.nl/univ/cry/steg [Accessed on 4 December 2013]. 48. Johnson, N. F., Duric, Z., and Jajodia, S., 2000. Information hiding: steganography and watermarking - attacks and countermeasures. 1st ed., Germany: Springer. 49. Johnson, N. F., Duric, Z., and Jajodia, S., 2001. Information hiding: steganography and watermarking – attacks and countermeasures, 1 ed., Boston: Kluwer Academic. 50. Ker, A.D., 2007. The Ultimate Steganalysis Benchmark. In: ACM, Proceedings of ACM multimedia and security workshop (MM&SEC). Dallas, Texas, USA, 2007, ACM. 51. Kerns, G. J., 2011. Introduction to Probability and Statistics Using R. (1st ed.). 52. Youngstown: Youngstown State University. 53. Khosravi, M. J., and Naghsh-Nilchi, A. R., 2014. A Novel Joint Secret Image Sharing and Robust Steganography Method Using Wavelet. Multimedia Systems, 20, pp. 215–226. 54. Kodovský, J., and Fridrich, J., 2013. Quantitative Steganalysis Using Rich Models. Media watermarking, security, and forensics, 8665, pp 1-11. 55. Kondo, K., 2010. Evaluation of A Stereo Audio Data Hidhing Method Using Inter- channel, Decorrelator Polarity. In: IEEE, proceedings of IEEE international conference on acoustics speech and signal processing (ICASSP). Dallas Texas, USA, 2010, IEEE. 56. Kraetzera, C., Dittmanna, J., and Langa, A., 2006. Transparency Benchmarking on Audio Watermarks and Steganography. In: SPIE, Proceedings of SPIE conference, at the security, steganography, and watermarking of multimedia contents VIII. 17 February 2006. 57. Kumar, P. J., Amit, K., and Vibha, S., 2009. Advanced Network Security Using Cryptography and Steganography. In: IEEE, Proceedings of international 58. conference on control, automation, communication and energy conservation. Kongu Engn Coll, Perundurai, India, 04-06 June 2009, IEEE. 59. Lashkari, A. H., Manaf, A. A., Masrom, M., and Daud, S. M., 2011. A Survey on Image Steganography Algorithms and Evaluation. In: Springer-Verlag, Proceedings of international conference on digital information processing and communications. Ostrava, Czech Republic, 2011, Springer-Verlag. 60. Lee, K., Westfeld, A., and Lee, S., 2006. Category Attack for LSB Steganalysis of JPEG Images. In: Springer-Verlag, Proceedings of digital watermarking (5th international workshop. London, 2006, Springer-Verlag. 61. Lerch, D. H., and Megias, D., 2013. LSB Matching Steganalysis Based on Patterns of Pixel Differences and Random Embedding. Computers & security. 32, pp. 192-206. 62. Leurs, L., 2001. JPEG Compression. [online] Available at: www.prepressure.com/techno/compressionjpeg.htm [Acces on 4 December 2013]. 63. Li, B., He, J., Huang, J., and Shi, Y. Q., 2011. A Survey on Image Steganography and Steganalysis. Journal of information hiding and multimedia signal processing, 2 (2), pp. 142-172. 64. Li, F., Zhang, X., Chen, B., and Feng, G., 2013. JPEG Steganalysis with High-dimensional Features and Bayesian Ensemble Classifier. IEEE signal processing letters, pp. 233-236. 65. Li, L., Sencar, H. T., and Memona, N., 2013. A Cost-effective Decision Tree Based Aproach to Steganalysis. Media watermarking, security, and forensics, 8665, pp. 1-7. 66. Li, X., Li, B., Luo, X., Yang, B., and Zhu, R., 2013. Steganalysis of a PVD-based Content Adaptive Image Steganography. Signal processing, 93, pp. 2529–2538. 67. Lin, E., Woertz, E., and Kam, M., 2004. LSB Steganalysis Using Support Vector Regression. In: Proceeding of the Fifth Annual IEEE SMC Information Assurance Workshop. 10-11 June 2004, IEEE. 68. Liu, G., Liu, W., Dai, Y., and Lian, S., 2013. Adaptive Steganography Based on Block Complexity and Matrix Embedding. Multimedia systems, 20, pp. 227–238. 69. Lu. J. C., Liu, F. L., and Luo, X. Y., 2014. Selection of Image Features for Steganalysis Based on The Fisher Criterion. Digital Investigation, 11, pp. 57–66. 70. Luo,W., Huang,W. F., and Huang, J., 2010. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE transactions on information forensics and security, 5 (2), pp. 201-214 . 71. Mallick, P. K., and Kamila, N. K., 2011. Crypto Steganography Using Linear Algebraic Equation. International journal of computer & communication technology, pp.106-112. 72. Mohammadi, F. G., and Abadeh. M. S., 2013. Image Steganalysis Using a Bee Colony Based Feature Selection Algorithm. Engineering applications of artificial intelligence, 31, pp. 35–43. 73. Mohd, B. J., Hayajneh, T., and Abed, S., 2014. Analysis and Modelling of FPGA Implementations of Spatial Steganography Methods. Journal of circuits, systems, and computers, 23 (2), pp. 1-26. 74. Morkel, T., Eloff, J.H.P., and Olivier, M.S., 2005. An Overview of Image Steganography. In: Venter, H. S., Proceedings of fifth annual information security South Africa Conference. Sandton, South Africa, June/July 2005, ISSA. 75. National academy of sciences. How do wavelets work?. [online] Available at: www.beyonddiscovery.org/content/view.page.asp?I=1956 [Acce on 4 December 2013]. 76. Nicholas, J., 1999. Introduction to descriptive statistics. Sydney: University of Sydney. 77. Paar, C., and Pelzl, J., 2011. Understanding Cryptography: A Textbook for Students and Practitioners, Berlin: Springer. 78. Pathak, P. and Selvakumar, S., 2014. Blind Image Steganalysis of JPEG images using Feature Extraction Through The Process of Dilation. Digital Investigation, 11, pp. 67–77. 79. Pevn´y, T., and Fridrich, J., 2008. Benchmarking for Steganography. In: Springer-Verlag, 80. Proceedings of information hiding. Berlin Heidelberg, 2008, Springer-Verlag. 81. Preda, R. O., and Vizireanu, N., 2011. New Robust Watermarking Scheme for Video Copyright Protection in The Spatial Domain. U.P.B. Sci. Bull., 73 (1), pp. 93-104. 82. Qiao, M., Sung, A. H., and Liu, Q., 2013. MP3 Audio Steganalysis. Information Sciences, 231, pp. 123–134. 83. Richer, P.,2003. Steganalysis: Detecting hidden information with computer forensic analysis. [e-book] SANS Institute < http://www.sans.org/reading- room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer- forensic-analysis-1014 > [Accessed on 4 December 2013]. 84. S. Hacker, 2000. MP3: the definitive guide. [online] Available at: http://www.oreilly.com/catalog/mp3/chapter/ch02.html [Accessed on 4 December 2013]. 85. Sahoo, G., and Tiwari, R. K., 2008. Designing an Embedded Algorithm for Data Hiding Using Steganographic Technique by File Hybridization. IJCSNS, 8 (1), pp. 228-233. 86. Salma, M., Maha, C., and Chokri, B. A., 2010. A Robust Audio Watermarking Technique Based on The Perceptual Evaluation of Audio Quality Algorithm in The Multi-resolution Domain. In: IEEE, Proceedings of IEEE international symposium on signal processing and information technology (ISSPIT). Luxor, 2010, IEEE. 87. Sarmah, D. K., and Bajpai, N., 2010. Proposed System for Data Hiding Using Cryptography and Steganography. International journal of computer applications, pp.1-8. 88. Shoemaker, C., 2002. Hidden bits: a survey of techniques for digital watermarking. [online] Available at: http://www.vu.union.edu/~shoemakc/watermarking/watermarking.html#watermark-object [Accessed on December 2013]. 89. Silman, J., 2001. Steganography and steganalysis: an overview. [e-book] Place of publication: SANS Institute < http://www.sans.org/reading- room/whitepapers/stenganography/steganography-steganalysis-overview-553 > [Accessed on: 4 December 2013]. 90. Singh, S., 2000. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, New York: Anchor Books. 91. Steganography, J. C., 2003. Binary Universe. [online] Available at: http://www.binary- universe.de/articles/5/english/steganodotnet5.html [Accessed on 4 December 2013]. 92. Sutaone, M.S., and Khandare, M.V, 2008. Image Based Steganography Using LSB Insertion Technique. In: IEEE, Proceedings of WMMN 2008. Beijing, January 2008. 93. Swanson, M. D., Zhu, B., and Tewfik, A. H., 1996. Robust Data Hiding for Images. In: IEEE, Proceedings of IEEE digital signal processing workshop. USA, September 1996. 94. Tang, M., Hu, J., Fan, M., and Song, W., 2013. Computers and Electrical Engineering. A steganalysis by adjacency pixel bits structure, 39, 488–496. Elsevier Ltd. 95. Tao, L., 2009. Introduction to cryptography. [online] Available at: http://csis.pace.edu/lixin/download/lab-cryptography.pdf [Accessed on 4 December 2013]. 96. Thai, T. H., Cogranne, R., and Retraint, F., 2014. Statistical Model of Quantized DCT Coefficients: Application in The Steganalysis of Jsteg Algorithm. IEEE transactions on image processing, 23 (5), 1980-1993. 97. Wang, H., and Wang, S., 2004. Cyber Warfare: Steganography VS. Steganalysis. 98. communications of the ACM, 47 (10), pp. 76-42. 99. Wayner, P., 2003. SpamMimic. [online] Available at: http://www.spammimic.com [Accesssed on 4 December 2013]. 100. WeiLi, X., and TaeKim, S., 2014. An Improved Cellular Automata-based Digital Image Watermarking Scheme Combining The Use of Pixel-wise Masking and 3D Integral Imaging. Optics communications, 319, pp. 45–55. 101. Westfeld, A., 2001. F5– Steganographic Algorithm. Information hiding, 2137, pp289-302. 102. Yan, D., Wang, R., Yu, X., and Zhu, J., 2013. Steganalysis for MP3 Stego Using Differential Statistics of Quantization step. Digital signal processing, 23, pp. 1181–1185. 103. Yang, Y., and Ivrissimtzis, I., 2014. Mesh Discriminative Features for 3D Steganalysis. ACM transactions on multimedia computing, communications and applications, 10 (3), pp. 27:1-27:13. 104. Zaidan, A. A., Zaidan, B. B., and Abdulrazzaq, M. M., 2009. Implementation Stage for High Securing Cover-file of Hidden Data Using Computation Between Cryptography and Steganography. In: Int Assoc Comp Sci & Informat Technol, 105. Proceedings of international conference on computer engineering and applications. Manila, Philippines, 06-08 Jun 2009, Int Assoc Comp Sci & Informat Technol. 106. Zamani, M., 2010. Genetic based substitution techniques for audio steganography. [e- book] Universiti Teknologi Malaysia. Available through: Universiti Teknologi Malaysia Library < http://eprints.utm.my/847/ > [Accessed on 4 December 2013]. 107. Zhang, D., Ni, J., Lee, D. J., and Huang, J., 2009. GSM based Security Analysis for Add- SS Watermarking. Digital watermarking, 5450, pp. 313-326. 108. Zhang, H., and Xijian, P., Multi-class Markov Models for JPEG Steganalysis. In: SPIE. Proceeding of: Fifth international conference on digital image processing (ICDIP 2013). Beijing, 19 July 2013, SPIE. 109. Zhang, T., and Ping, X., 2003. Reliable Detection of LSB Steganography Based on Difference Image Histogram. In: Proceeding of 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing. 6-10 April 2003. IEEE. 110. Zhang, W., and Li, S., 2004. Security Measurements of Steganographic Systems. In: Springer, Proceedings of applied cryptography and network security (ACNS). Berlin Heidelberg, 2004. Springer. 111. Zheng, E., Ping, X., and Zhang, T., 2011. Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography. KSII transactions on internet and information systems. 5 (4), 840-855. 112. Zielinska, E., Mazurczyk, W., and Szczypiorski, K., 2014. Trends in Steganography. 113. Communications of the ACM, 57 (3), pp.86-95. 114. Ziou, D., and Jafari, R., 2014. Efficient Steganalysis of Images: Learning Is Good for Anticipation. Pattern anal applic, 17, pp. 279–289.